• HOME
  • WHAT WE DO
    • Flat Rate Managed IT Services and Support
    • Cloud Solutions
    • Technology Consulting
    • Hardware and Software
    • Phone Systems
  • ABOUT
    • Why Singlesource IT?
    • News
    • Technology Partners
  • CONTACT US
  • Search

Mobile Menu

Call us today!

(614) 784-9738

  • Menu
  • Skip to right header navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Before Header

Call us today:  (614)784-9738

Client Login

Free Risk Report

Download Your Cyber Security Guide

Singlesource IT

Your Central Ohio IT Provider. Specializing in small and mid-sized business.

  • HOME
  • WHAT WE DO
    • Flat Rate Managed IT Services and Support
    • Cloud Solutions
    • Technology Consulting
    • Hardware and Software
    • Phone Systems
  • ABOUT
    • Why Singlesource IT?
    • News
    • Technology Partners
  • CONTACT US
  • Search

News & Updates

Latest news from our law firm and the community we represent.

Cyber Security Awareness Month is October!

2004 saw two major events shake the IT industry: First was the founding of Singlesource IT in Columbus, OH, bringing enterprise-level expertise to clients big and small throughout the Buckeye state and beyond. Second, the President of the United States and Congress declared the month of October to be Cybersecurity Awareness Month. For 20 years, …

Cyber Security Awareness Month is October!Read More

Singlesource IT Office

Singlesource IT Is On The Move!

Starting Monday, August 14th, the team at Singlesource IT is excited to announce that we’ll be serving you from our new location: 148 N. High St.Gahanna, Ohio 43230 Conveniently located a short drive from the 270 beltway in the heart of Gahanna, our new offices will keep us close to our valued Central Ohio clients, …

Singlesource IT Is On The Move!Read More

stolen iphone

Stolen iPhone? Don’t Get Locked Out Of Your Apple Account!

Thieves are using a built-in setting on every iPhone called the “recovery key” against the owners of stolen iPhones. In theory, the recovery key is there for your protection. It’s a form of two-factor-authentication, known as “2FA” in the industry. The recovery key is an additional 28-digit code that can be used to access and …

Stolen iPhone? Don’t Get Locked Out Of Your Apple Account!Read More

World Backup Day

March 31st is World Backup Day. Take Action Now!

Back in 2011, tech enthusiasts from the Reddit community got together and realized that we’ve got a problem: we’re not taking file backups seriously. This was true across the board — from commercial data to personal photos — too few of us had a smart backup strategy in place.  The result is World Backup Day, …

March 31st is World Backup Day. Take Action Now!Read More

Report Hub - SSIT

Introducing Report Hub – Custom Cyber Threat Reporting Now Available

We are excited to announce the launch of Report Hub, a new feature within our human risk management service that offers an easy and efficient way to track employee security posture in your business. With Report Hub, you’re able to:  ● Find all of your human risk performance metrics in one easy-to-digest report  ● View …

Introducing Report Hub – Custom Cyber Threat Reporting Now AvailableRead More

malware detection singlesource it

The Top 3 Malware Threats Of The Year

December is filled with “Best Of” lists, with articles everywhere ranking the biggest tunes of the year, the highest-grossing movies, or the most-streamed shows. At Singlesource IT, we take cyber-security seriously, so when our partners at Dark Cubed send out their “Worst Of” Malware Report, we know we’ve got to take a look. The end …

The Top 3 Malware Threats Of The YearRead More

human cyber risk

Check Out Our New 2022 Guide to Reducing Human Cyber Risk!

We’ve just updated our Guide to Reducing Human Cyber Risk, and you should take a look. Why is the word “human” in the title? Good question! When we think of “cyber risk”, most of us worry about hackers running advanced AIs, using high-tech tools to crack into our systems and steal our identities and trade …

Check Out Our New 2022 Guide to Reducing Human Cyber Risk!Read More

Microsoft Testing Ads in Windows 11 File Explorer

We understand the need to do some cross-promoting, but Microsoft’s latest adventure in product-pushing is generating some serious push-back. According to tech news site Bleeping Computer, Microsoft has added a “feature” in some Windows 11 updates to show advertisements for other Microsoft services right in Windows Explorer — the default tool that we all use …

Microsoft Testing Ads in Windows 11 File ExplorerRead More

tech tips feb 2022

Cybersecurity Tips of the Month

Put these cybersecurity tips to use today! From our partners at Keeper Security: Ransomware has grown into a multi-billion-dollar industry. On average, a ransomware attack occurs about every 11 seconds, and the downtime from an attack averages 9.6 days. Preventing ransomware attacks requires a layered approach that combines security defenses with proactive measures to prevent …

Cybersecurity Tips of the MonthRead More

  • « Go to Previous Page
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Page 5
  • Page 6
  • Go to Next Page »

Primary Sidebar

Need IT?

We’ve partnered with the best. Find out why Singlesource IT should be your one source, one call technology solution.

GET IN TOUCH TODAY.

LATEST NEWS

Free cybersecurity security authentication vector

A Small Business Guide to Implementing Multi-Factor Authentication (MFA)

Have you ever wondered how vulnerable your business is to cyberattacks? According to recent reports, …

A piece of cardboard with a keyboard appearing through it

AI for Efficiency: How to Automate Daily Tasks and Free Up Your Time (Without a Huge Budget)

Running a small business means wearing a lot of hats. These hats run from managing operations, …

person-using-silver-and-black-laptop-computer

Can My Data Be Removed from the Dark Web?

Personal data protection is more important than ever in this digital world. The dark web is a secret …

crop-cyber-spy-hacking-system-while-typing-on-laptop

7 Unexpected Ways Hackers Can Access Your Accounts

The digital age has made our lives easier than ever, but it has also made it easier for hackers to …

Free computer data digital vector

How Do Websites Use My Data? (Best Practices for Data Sharing)

Websites store and use user data in many ways, usually to personalize content, show ads, and make …

Footer

Contact Us

Singlesource IT
(614) 784-9738

148 N. High St.
Gahanna, OH 43230

Newsletter

Sign up to get free resources, tips, and news from Singlesource IT.

Thanks for signing up!

Copyright © 2025 · Singlesource IT